There was an interesting paper in 2013 from the University of Pennsylvania called Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities. One compelling example the authors discuss is the lack of known security breaches in voting machines, contrasted with the high number of blatant vulnerabilities researchers find on these machines. The authors argue that it may be a "honeymoon effect" that prevents hackers from exploiting these vulnerabilities, since these machines are only in use for one to two days after their release. Without providing the proper amount of time to find and exploit vulnerabilities, these machines are for the most part used for their original intention.[1][2]
My question is simple: is this an example of "security through obscurity"? Could one say that the voting machines' internals are obscured from hackers by the shortness of the time span that they are exposed to the world, and by the fact that they are all closed source, proprietary systems?
If this scenario is not security through obscurity, is there a term that describes this type of "security"?
[2] https://www.youtube.com/watch?v=rhcpCdRvNOg (DEF CON 19)